Reading time:
~5 min
Posted
by daniel
on
23 December 2013
With 2013 coming to a close, I thought it pertinent to look back at the year we’ve had and also...
Reading time:
~2 min
Posted
by etienne
on
17 December 2013
Botconf’13, the “First botnet fighting conference” took place in Nantes, France from 5-6 December 2013. Botconf aimed to bring together...
Reading time:
~2 min
Posted
by etienne
on
22 November 2013
December sees SensePost presenting Hacking by Numbers: Mobile at BlackHat West Coast Trainings. This course was first presented at BlackHat...
Reading time:
Less than a minute
Posted
by jeremy
on
22 November 2013
Hey all, So following on from my talk (slides, video) I am releasing the NMAP service probes and the Poison...
Reading time:
~2 min
Posted
by daniel
on
15 November 2013
For the last year, Glenn and I have been obsessed with our phones; especially with regard to the data being...
Reading time:
~1 min
Posted
by Charl van der Walt
on
01 November 2013
We’re pleased to announce our acquisition today by SecureData Europe. SecureData (www.secdata.com) is a complete independent security services provider based...
Reading time:
~3 min
Posted
by Dominic White
on
06 September 2013
We recently gave a talk at the ITWeb Security Summit entitled “Offense Oriented Defence”. The talk was targeted at defenders...
Reading time:
~3 min
Posted
by daniel
on
04 September 2013
In one week, it’s 44CON time again! One of our favourite UK hacker cons. In keeping with our desire to...
Reading time:
~1 min
Posted
by behrang
on
19 August 2013
We are publishing the research paper and tool for our BlackHat 2013 USA talk on the Z-Wave proprietary wireless protocol...
Reading time:
~3 min
Posted
by etienne
on
19 August 2013
West Coast in the house, well actually more like an African visiting Seattle for Blackhat’s West Coast Trainings. We’ve had...
Reading time:
~12 min
Posted
by Dominic White
on
12 July 2013
In preparation for our wireless training course at BlackHat Vegas in a few weeks, I spent some time updating the...
Reading time:
~1 min
Posted
by daniel
on
06 June 2013
As SensePost grows, so does our desire to ensure a healthy balance between technical savvy and organisational skills. As a...
Reading time:
~15 min
Posted
by behrang
on
04 June 2013
Introduction: New types of mobile applications based on Trusted Execution Environments (TEE) and most notably ARM TrustZone micro-kernels are emerging which...
Reading time:
~2 min
Posted
by Ian de Villiers
on
03 June 2013
One of the things we try and get across in our training – is that pen-testing requires out of the...
Reading time:
~7 min
Posted
by Charl van der Walt
on
01 June 2013
You’ve probably never thought of this, but the home automation market in the US was worth approximately $3.2 billion in...
Reading time:
~5 min
Posted
by george
on
27 May 2013
Categories:
Backdoor,
Fun,
Howto,
Infrastructure,
Internals,
Linux,
Local,
Post-exploitation,
Shells,
Silly-yammerings,
Tricks
Willems and I are currently on an internal assessment and have popped a couple hundred (thousand?) RHEL machines, which was...
Reading time:
~3 min
Posted
by Charl van der Walt
on
26 May 2013
We have an updated breakdown of our BlackHat courses here With the ‘early registration’ discount period coming to an end...
Reading time:
~4 min
Posted
by glenn
on
23 May 2013
BlackOps you say? At SensePost we have quite a range of courses in our Hacking by Numbers series. We feel...
Reading time:
~2 min
Posted
by george
on
23 May 2013
We’re excited to be presenting our Hacking By Numbers Combat course again at Black Hat USA this year. SensePost’s resident...
Reading time:
~3 min
Posted
by etienne
on
20 May 2013
Monday morning, raring for a week of pwnage and you see you’ve just been handed a new assessment, awesome. The...
Reading time:
~3 min
Posted
by Dominic White
on
09 May 2013
When doing wireless assessments, I end up generating a ton of different scripts for various things that I thought it...
Reading time:
~3 min
Posted
by etienne
on
22 April 2013
There are multiple paths one could take to getting Domain Admin on a Microsoft Windows Active Directory Domain. One common...
Reading time:
~8 min
Posted
by behrang
on
12 April 2013
A cloud storage service such as Microsoft SkyDrive requires building data centers as well as operational and maintenance costs. An alternative approach...
Reading time:
~3 min
Posted
by inaki
on
04 March 2013
A few days ago, during one of those nights with the baby crying at 2:00 am and the only thing...
Reading time:
~1 min
Posted
by glenn
on
04 March 2013
SensePost will be at Black Hat Europe 2013 to deliver the Bootcamp module of the Hacking by Numbers series. This...
Reading time:
~2 min
Posted
by daniel
on
04 March 2013
Have a keen interest on scanning over 12000 IP’s a week for vulnerabilities? Excited about the thought of assessing over...
Reading time:
~2 min
Posted
by daniel
on
02 March 2013
As we grow and operate on a number of continents, so does our dependence on a rock-solid IT infrastructure. We...
Reading time:
~2 min
Posted
by daniel
on
14 February 2013
Today was our 13th birthday. In Internet years, that’s a long time. Depending on your outlook, we’re either almost a pensioner...
Reading time:
~5 min
Posted
by etienne
on
11 February 2013
Taking inspiration from Vlad’s post I’ve been playing around with alternate means of viewing traffic/data generated by Android apps. The...
Reading time:
~3 min
Posted
by Dominic White
on
16 January 2013
On a recent engagement, we were tasked with trying to gain access to the network via a phishing attack (specifically...